Embedded cover image

286: Twenty Cans of Gas (Repeat)

Embedded

00:00

How Do You Draw an Owlf?

These types of attacks are more advanced. As like we're breaking crypto and doing all this stuff, a but you need to know a fair amount about the device. So for example, if i was attacking something like that, i would need to know, ok, is loading a from spy flash hanging off the device. It's loading the firmwere image on boot. And that firmweremage is tcrypted, and i'm pretty confident it's a s in maybe c b c mode or something like that. But normally what happens, right, is, like, their using a more complicated mode,. Of as or m it's not really clear when the description happens. Let's say,

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app